|
by Abdel-Hamid, Ahmed, Andrews, Scott, Arsanjani, Ali
Published 2015
Subjects:
“...Mobile computing / Security measures...”Published 2015
IBM Corporation, International Technical Support Organization
|
by Abd el-Samie, Fathi E., Ahmed, Hossam Eldin H., Elashry, Ibrahim F., Shahieen, Mai H.
Published 2014
Subjects:
“...Image processing / Security measures...”Published 2014
CRC Press
|
by Haber, Morey J., Hibbert, Brad
Published 2018
Table of Contents:
“... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...”Published 2018
Apress, Distributed to the Book trade worldwide by Springer
- 1
- 2